Page 146 - Courses
P. 146

Logical Security Applications


            Concepts: Computer Types

            Each type of computer has its own OS. Computer types include:

            Mainframe Computer

              High performance, large-scale computer used when greater availability and capacity is needed,
               and large amounts of data are handled.
              Used for high volume and process-intensive applications.
              Usually take up most of an organization’s computer room and requires air conditioning.
              Example OSs: z/OS, Unix, and Linux.
              Example applications: mortgage processing and banking systems.

            Midrange Computer

              Not as powerful as a mainframe.
              Resides on racks in a computer room and takes up considerably less space.
              Better for smaller-to-medium-sized applications.
              Less expensive.
              Example OSs: Unix, OSx, AS 400, Sun OSx, and Windows.
              Example applications: mid-to-smaller-payroll and GL systems.

            Personal Desktop Computer

              Standard computer used on a daily basis.
              Least expensive.
              Example OSs: Unix, IOS, Android, MAC OSx, and Windows.
              Example application: Windows Office.

            Concepts: Server Security Configuration

              Key points of server security configuration:
              To ensure a consistent approach, and to maintain ability and security, all servers in a
               organization of the same type have the same base configuration.
              Differences between servers occur when applications that run on them require different OS
               settings.
              Normally, a server team will install the server with the base security configuration, and then
               hand it over to the application team to complete configuration of the application.
              Usually, the server teams receive the server back from the application team to re-evaluate
               access, as the application team may not remove all temporary files or accounts.
              If IT is capable, the security evaluation is performed by the security administration team, or by
               the server team with guidance by the security administration team.



            Copyright © 2022 by The Institute of Internal Auditors, Inc. All rights reserved.
   141   142   143   144   145   146   147   148   149   150   151